• Title/Summary/Keyword: Trapdoor approach

Search Result 4, Processing Time 0.022 seconds

Trapdoor Approach for Removal of the Pleomorphic Adenoma in the Palate: Case Report (구개부에 발생한 다형성선종의 트랩도어 수술법에 대한 증례보고)

  • Lee, Eun-Young;Kim, Kyoung-Won
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.33 no.6
    • /
    • pp.520-524
    • /
    • 2011
  • A 27-year-old female presented to our hospital with a slow growing, hard and soft palate mass on the right that had been present for the several months. Physical examination showed a 2 cm, firm, well-circumscribed, painless mass on the right side of the palate. PNS computer tomographic imaging showed a $1.5{\times}1.3{\times}2$ cm well-defined cystic mass on the right side of both the hard and soft palate without any underlying bone change. The lesion was completely excised under general anesthesia. In order to preserve the palatal mucosa, trapdoor approach for removal of the pleomorphic adenoma was done. This technique provided more comfortable healing of the operative site. Three years after surgery, there was no evidence of recurrence. If pleomorphic adenoma without bony and mucosal destruction exists, we suggest consideration of the trapdoor approach to protect the palatal mucosa. In view of the potential for tumour recurrence, long-term follow-up and careful examination are necessary.

A New Method for Detecting Trapdoors in Smart Cards with Timing and Power Analysis (시차와 전력 분석을 이용한 새로운 스마트카드 트랩도어 검출방법)

  • Lee Jung Youp;Jun Eun-A;Jung Seok Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.47-57
    • /
    • 2005
  • For economic reasons, even though there are some security problems, the commands of re-initializing and writing patch code are widely used in smart cards. The current software tester has difficulty in detecting these trapdoor commands because trapdoors are not published and programmed sophisticatedly. Up to now the effective way to detect them is to completely reveal and analyze the entire code of the COS with applications such as the ITSEC. It is, however, a very time-consuming and expensive processes. We propose the new detecting approach of trapdoors in smart cards using timing and power analysis. With our experiments, this paper shows that the proposed approach is more practical than the current methods.

A New Technique for Conchal Cartilage Harvest

  • Kim, Joon Young;Yang, Ho Jik;Jeong, Ji Won
    • Archives of Plastic Surgery
    • /
    • v.44 no.2
    • /
    • pp.166-169
    • /
    • 2017
  • The goal of auricular cartilage harvest is to obtain a sufficient amount for reconstruction and to minimize the change in ear shape. The cartilage can be harvested by a posterior or anterior approach, and each method has advantages and disadvantages. The posterior approach presents the advantage of scar concealment, but there are limits to the amount of cymba cartilage that may be harvested. In contrast, the anterior approach may cause a noticeable scar. However, as cartilage is collected, the anterior approach provides a view that facilitates the preservation ear structure. In addition, it is possible to obtain a greater amount of cartilage. From January 2014 to December 2015, we harvested auricular cartilage graft material in 17 patients. To prevent the development of trapdoor scars or linear scar contracture, short incisions were made on the superior border of the cymba and cavum. Two small and narrow incisions were made, resulting in suboptimal exposure of the surgical site, which heightens the potential for damaging the cartilage when using existing tools. To minimize this, the authors used a newly invented ball-type elevator. All patients recovered without complications after surgery and reported satisfaction with the shape of the ear.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.